First published: Wed May 07 2003(Updated: )
Format string vulnerability in POP3 client for Mirabilis ICQ Pro 2003a allows remote malicious servers to execute arbitrary code via format strings in the response to a UIDL command.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
CenterICQ | =99a_2.15build1701 | |
CenterICQ | =99a_2.21build1800 | |
CenterICQ | =2000.0a | |
CenterICQ | =2000.0b_build3278 | |
CenterICQ | =2001a | |
CenterICQ | =2001b_build3636 | |
CenterICQ | =2001b_build3638 | |
CenterICQ | =2001b_build3659 | |
CenterICQ | =2002a_build3722 | |
CenterICQ | =2002a_build3727 | |
CenterICQ | =2003a_build3777 | |
CenterICQ | =2003a_build3799 | |
CenterICQ | =2003a_build3800 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2003-0235 is considered a critical vulnerability due to its potential to allow remote code execution.
To address CVE-2003-0235, update to a patched version of the Mirabilis ICQ client that resolves the format string vulnerability.
CVE-2003-0235 affects Mirabilis ICQ Pro versions including 99a_2.15build1701, 99a_2.21build1800, and several 2000 to 2003 builds.
CVE-2003-0235 exploits a format string flaw in the POP3 client that can be triggered by malicious responses to the UIDL command.
A temporary workaround for CVE-2003-0235 is to disable or limit the use of the affected POP3 client until a patch is applied.